Question
Answered step-by-step

No explanation required I have my owned answers just need another...

No explanation required I have my owned answers just need another eyes to make sure my answers are correct or not.

Q1. Which of the following conditions shows the presence of a honeypot?

a.     Port show a particular service running but deny a three-way handshake connection

b.     Port show a particular service running and allow a three-way handshake connection

c.     Ports do not show any particular service running

d.     Scan shows that no scanned port is live on the network


Q2. John looks up Jesse's address and phone number on zabasearch.com, calls Comcast, and cancels Jesse's account. What type of attack is John the attacker using?

a.     Phishing

b.     Whaling

c.     Social engineering

d.     Buffer overflow


Q3. Which of the following factors contribute to a successful session hijacking attack?

a.     Definite session expiration time

b.     No clear text transmission

c.     Account lockout for invalid session IDs

d.     Weak session ID generation algorithm


Q4. Which of the following is a symptom of a DoS attack?

a.     Automatic increase in network bandwidth

b.     Unavailability of a particular website

c.     Decrease in the amount of spam emails received

d.     Automatic increase in network performance


Q5. Activities like dumpster diving, reading articles related about a company, and searching job postings on an online website fall under what category?

a.     Active reconnaissance

b.     Passive reconnaissance

c.     Active information gathering

d.     Passive information gathering


Q6. Which of the following is the 3D Graphics Library of Android?

a.     SSL

b.     OpenGL

c.     Media Framework

d.     SGL


Q7. A misconfiguration can include all but the following

a.     Disabled security feature

b.     Unneeded open port

c.     Unpatched systems

d.     Buffer overflow threat vector


Q8. The following tool is one of the most well-known vulnerability scanners:

a.     Metasploit

b.     Nessus

c.     hping 

d.     kali



Q9. The following allows an attacker on a switch to see all traffic, as if it were a hub:

a.     SPAN port

b.     ARP table

c.     BRIDGING mode

d.     NBTSTAT


Q10. Which of the following operating systems uses LM and NTLM hashes? (choose all that apply)

a.     Windows

b.     Cisco IOS

c.     Linux

d.     Solaris/Unix


Q11. The ping of death involves:

a.     Flooding

b.     Scanning

c.     Sending an oversized packet

d.     Spoofing


Q12. Which of the following are included in Android Runtime?

a.     Dalvik Virtual Machine

b.     core libraries

c.     Bind IPC driver

d.     Flash memory driver 

Answer & Explanation
Verified Solved by verified expert
Rated Helpful
<p>fficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis</p> Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet

Unlock full access to Course Hero

Explore over 16 million step-by-step answers from our library

Subscribe to view answer

o. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor

entesque dapibus efficitur laoreet. Nam

e vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem

, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac,

acinia pulvinar tortor nec facilisis. Pellen

inia pulvinar tortor nec fac

facilisis. Pellentesque dapibus efficit

molestie consequat, ultrices ac

trices ac magna. Fusce dui lect

s ante, dapibus a molestie co

ac, dictum vitae odio. Donec aliquet. Lorem ipsum

m ipsum dolor sit amet, consectetur adipisci

Step-by-step explanation

itur laor

nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dum ipsum dolor sit amet, consectetur adipiscingsxdictum vit

gue

itur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac mage vel laoreetsxinia pul

gue

ongue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam ls ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel lasum dolor sit amet, c

gue

molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, d, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit., consectetu

gue

molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsu

gue

Donec aliquet. Lorem ipsum dolor sitfficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna.Donec aliquet. Lore

gue

ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam laciipsum dolor sit amet, consectetur adipiscing elit. Nam lsllentesque dapibu

gue

ec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesquedictum vitae odio. Donec aliquet. Lorem ipsum dolors,m ipsum d

gue

pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices asque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices acgue vel laoreet ac, d

Student reviews
100% (2 ratings)
Clear formatting

"Thank you"